Embedding Security in AI Systems From the Start Is Essential
IBM executive Suja Viswesan emphasizes the importance of integrating security into AI systems from the beginning as autonomous agents transform digital ecosystems

By Anna Madeline • May 5, 2025
In the rapidly evolving landscape of generative artificial intelligence, security can no longer be treated as an afterthought. According to Suja Viswesan, IBM's Vice President of Security and Runtime Products, organizations must embed security protocols into AI systems from the ground up as autonomous agents become more sophisticated.
The Critical Balance Between AI and Human Oversight
Viswesan highlighted the delicate balance between human oversight and AI autonomy during her discussion at RSAC Conference 2025. She likened security integration to seasoning food: "Salt and pepper needs to be there with it."
Key takeaways from her interview with Information Security Media Group include:
- Human oversight remains crucial for AI tools and systems
- Unvetted AI responses can lead to risks and eroded trust
- Organizations must implement enterprise-wide security protocols
Why Security Must Be Baked In
Viswesan, who has held leadership roles at IBM, LinkedIn, and WarnerMedia, stressed that traditional cybersecurity boundaries are being reshaped by AI advancements. She warned that bolting security onto existing systems is no longer sufficient - it must be a foundational component.
See Also: Boost your cybersecurity team capabilities with GenAI
As AI agents become increasingly integrated into daily operations across industries, Viswesan's message serves as a timely reminder for organizations to prioritize security in their AI development strategies.
Related News
Agent-to-Agent Testing Ensures Reliable AI Deployment
Scalable continuous validation through agent-to-agent testing guarantees AI agents work reliably in dynamic environments.
CometJacking Attack Hijacks Perplexity AI Browser to Steal User Data
A malicious URL exploit turns Perplexity's Comet AI browser into a data thief, exfiltrating emails, calendar, and memory via encoded payloads.
About the Author

Alex Thompson
AI Technology Editor
Senior technology editor specializing in AI and machine learning content creation for 8 years. Former technical editor at AI Magazine, now provides technical documentation and content strategy services for multiple AI companies. Excels at transforming complex AI technical concepts into accessible content.